Cryptography & Network Security: Principles & Practice, 2/e (精裝)
William Stallings
- 出版商: Prentice Hall
- 出版日期: 1999-04-30
- 售價: $1,009
- 語言: 英文
- 頁數: 569
- 裝訂: Hardcover
- ISBN: 0138690170
- ISBN-13: 9780138690175
-
相關分類:
資訊安全
無法訂購
買這商品的人也買了...
-
$1,100$1,078 -
$1,205TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)
-
$686Introduction to the Theory of Computation
-
$1,078UNIX Network Programming, Volume 1, 2/e (精裝)
-
$1,200$1,176 -
$1,029The Unified Modeling Language User Guide
-
$1,029Fundamentals of Data Structures in C
-
$1,078Discrete and Combinatorial Mathematics: An Applied Introduction, 4/e (精裝)
-
$1,090$1,068 -
$2,610$2,480 -
$2,810$2,670 -
$960An Introduction to Formal Languages and Automata, 3/e
-
$1,550$1,473 -
$1,029Operating System Concepts, 6/e
-
$1,045Java How to Program, 4/e
-
$1,000$980 -
$970Introduction to Algorithms, 2/e
-
$1,330$1,260 -
$1,150$1,127 -
$1,575$1,496 -
$1,078Database Systems: A Practical Approach to Design, Implementation, 3/e
-
$1,710$1,625 -
$2,450$2,328 -
$3,120$2,964 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
相關主題
商品描述
Summary
86901-6
As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the disciplines of cryptography and network security have matured, leading to the development of practical, available applications to enforce network security.
Best-selling author and two-time winner of the TEXTY award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security.
Extensively reorganized to provide the optimal sequence for classroom instruction and self-study, the second edition includes these key features.
- Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.
- NEW - Discussion of block cipher design principles, plus coverage of Blowfish, CAST-128, Triple DES, and other algorithms
- NEW - Chapters on IP security and Web security
- Expanded coverage of public-key encryption algorithms and design principles, including RSA and elliptic curve cryptography
- Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET
- On-line transparency masters, an Internet mailing list, and links to relevant web sites are available to http://www.shore.net/~ws/Security2e.html